Lesson Learned #401:Creating Dynamic Views from Multiple Tables using Stored Procedure

Recently, I encountered an intriguing scenario where our customer needed to dynamically create views based on multiple tables, allowing them to efficiently filter and aggregate data. The challenge arose when dealing with varying amounts of data, which … Continue reading Lesson Learned #401:Creating Dynamic Views from Multiple Tables using Stored Procedure

Analysis of Storm-0558 techniques for unauthorized email access

Analysis of the techniques used by the threat actor tracked as Storm-0558 for obtaining unauthorized access to email data, tools, and unique infrastructure characteristics. 

The post Analysis of Storm-0558 techniques for unauthorized email access appeared first on Microsoft Security Blog.

Continue reading Analysis of Storm-0558 techniques for unauthorized email access

Public preview: Windows 365 alerts for Cloud PCs in grace periods

We are excited to announce the public preview of new alerts for IT admins managing Cloud PCs in Intune to better inform them about Cloud PCs in a grace period. This capability is available for Windows 365 Enterprise customers today!
We heard you. You w… Continue reading Public preview: Windows 365 alerts for Cloud PCs in grace periods

Monitor AKS cluster security using Syslog and Microsoft Sentinel

Syslog is one of the critical logging components for monitoring security in Kubernetes (K8S) workloads. We recently launched the ability to collect Syslog from AKS clusters using Azure Monitor – Container Insights. In this blog post, we discuss how Azu… Continue reading Monitor AKS cluster security using Syslog and Microsoft Sentinel